Arbitrary code execution vulnerability in Mozilla products via a crafted JavaScript (Mac OS X)ID: oval:org.secpod.oval:def:23970 | Date: (C)2015-03-30 (M)2023-12-07 |
Class: VULNERABILITY | Family: macos |
The host is installed with Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2 or SeaMonkey before 2.33.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which do not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access. Successful exploitation could allow attackers to read or write to unintended memory locations, and consequently execute arbitrary code.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Product: |
Mozilla Firefox ESR |
Mozilla Firefox |
Mozilla SeaMonkey |